Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

Kaspersky Lab has uncovered infrastructure used by the well-known Russian-speaking APT group Crouching Yeti, also known as Energetic Bear, which includes compromised servers across the world. According to the research, numerous servers in different countries were hit since 2016, sometimes in order to gain access to other resources. Others, including those hosting Russian websites, were used as watering holes. Crouching Yeti is a Russian-speaking advanced persistent threat (APT) group that Kaspersky Lab has been tracking...

Read more

Earlier this month, the National Cyber Security Centre (NCSC) published a report listing ‘cryptojacking’ as one of the biggest cyber threats facing UK businesses. The report warned that up to 55% of businesses globally are already affected by these types of attacks, and that this figure is set to only rise as attackers exploit new techniques to hijack computers. But what exactly is cryptojacking, and how can technology be properly leveraged to protect businesses from...

Read more

The cybersecurity industry is being treated to a rare regal flare, as Eskenzi PR and Marketing is presented with the Queen’s Award for Enterprise 2018. Eskenzi PR Ltd is a specialist agency, working closely with the very best cyber security companies in the world, including those coming out of Israel, Silicon Valley, Europe and of course, the UK. The agency represents over 25 companies, working with many leading vendors in cyber including Airbus Cybersecurity, Imperva,...

Read more

Positive Technologies experts Ilya Karpov, Evgeny Druzhinin, and Stephen Nosov have discovered four vulnerabilities in management cards for APC by Schneider Electric hardware. These uninterrupted power supply (UPS) units are used in various sectors. Two of the vulnerabilities received the maximum possible CVSS v3 score of 10, indicating a very high degree of risk.     Security issues were found in APC MGE SNMP/Web Card Transverse 66074 management cards, which are present in several series of UPS units:...

Read more

Her Majesty The Queen, advised by the Prime Minister, has honoured Eskenzi PR and Marketing with a Queen’s Award for Enterprise 2018, recognising its outstanding achievement in International Trade. Eskenzi has been in business for over twenty years, working with cyber security companies all over the world, to raise awareness of security issues organisations face and the cutting edge technology available to thwart cyber attacks.  This award comes at a time when the government is...

Read more
Data Breach Cyber attack code

At the beginning of this week (Monday 16th), TaskRabbit, the IKEA-owned mobile marketplace that matches freelance labour with local demand, had its website and app hacked resulting in both shutting down and going offline. The company had offered a statement to its customers saying, “ we understand how important your personal information is and are working with an outside cybersecurity firm and law enforcement to determine the specifics.” An investigation is under way to seek...

Read more
data

New analysis has found that over the last three years, 35% of all major data breaches were caused by negligent or malicious employees, costing the UK-based organisations involved almost £500,000 in fines from the Information Commissioner’s Office (ICO). This study, carried out by global security software company Avecto, looked at all the breaches between August 2015 and January 2018, where the ICO issued fines for ‘failing to take appropriate technical and organisational measures against the unauthorised processing...

Read more

Experts from SANS last night presented the five most dangerous new cyber attack techniques in their annual RSA keynote session in San Francisco, and shared their views on how they work, how they can be stopped or at least slowed, and how businesses and consumers can prepare. The five threats outlined are: Repositories and Cloud Storage Data Leakage Big Data Analytics, De-Anonymization, and Correlation Attackers Monetize Compromised Systems Using Crypto Coin Miners Recognition of Hardware Flaws More Malware...

Read more

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, is helping Dutch low-cost airline, Transavia streamline business processes. Through its One Identity Active Roles deployment for a hybrid Active Directory environment, Transavia is able to save roughly 10 minutes per user on provisioning and de-provisioning tasks covering hundreds of extra staff during peak travel seasons. Air travel companies experience extreme seasonal loads, taking on thousands of short-term staff as...

Read more
Data Breach Cyber attack code

With ransomware and distributed denial of service (DDoS) attacks on the rise, the average number of focused cyberattacks per organisation has more than doubled this year compared to the previous 12 months (232 through January 2018 versus 106 through January 2017). In the face of these growing cyber threats, organisations are demonstrating far more success in detecting and blocking them, according to a new study from Accenture (NYSE: ACN).   Yet, despite making significant progress,...

Read more
Page 48 of 296 1 47 48 49 296